OLD | NEW |
---|---|
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "content/shell/browser/shell_browser_context.h" | 5 #include "content/shell/browser/shell_browser_context.h" |
6 | 6 |
7 #include "base/bind.h" | 7 #include "base/bind.h" |
8 #include "base/command_line.h" | 8 #include "base/command_line.h" |
9 #include "base/environment.h" | 9 #include "base/environment.h" |
10 #include "base/file_util.h" | 10 #include "base/file_util.h" |
(...skipping 181 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
192 callback.Run(false); | 192 callback.Run(false); |
193 } | 193 } |
194 | 194 |
195 void ShellBrowserContext::CancelMIDISysExPermissionRequest( | 195 void ShellBrowserContext::CancelMIDISysExPermissionRequest( |
196 int render_process_id, | 196 int render_process_id, |
197 int render_view_id, | 197 int render_view_id, |
198 int bridge_id, | 198 int bridge_id, |
199 const GURL& requesting_frame) { | 199 const GURL& requesting_frame) { |
200 } | 200 } |
201 | 201 |
202 void ShellBrowserContext::RequestProtectedMediaIdentifierPermission( | |
203 int render_process_id, | |
204 int render_view_id, | |
205 int bridge_id, | |
206 int group_id, | |
207 const GURL& requesting_frame, | |
208 const ProtectedMediaIdentifierPermissionCallback& callback) { | |
209 // Always reject requests for testing. | |
jam
2014/01/02 22:50:56
hmm, content/shell is an example of a content embe
Kibeom Kim (inactive)
2014/01/02 23:26:36
(This is not used in any test, unless some tests a
jam
2014/01/03 00:54:23
yes, since content shell is just an example of a s
jam
2014/01/03 00:57:35
btw i've sent out a fix in https://codereview.chro
Kibeom Kim (inactive)
2014/01/03 00:59:17
Done. (already :) )
| |
210 callback.Run(false); | |
211 } | |
212 | |
213 void ShellBrowserContext::CancelProtectedMediaIdentifierPermissionRequests( | |
214 int group_id) { | |
215 } | |
216 | |
202 net::URLRequestContextGetter* | 217 net::URLRequestContextGetter* |
203 ShellBrowserContext::CreateRequestContextForStoragePartition( | 218 ShellBrowserContext::CreateRequestContextForStoragePartition( |
204 const base::FilePath& partition_path, | 219 const base::FilePath& partition_path, |
205 bool in_memory, | 220 bool in_memory, |
206 ProtocolHandlerMap* protocol_handlers) { | 221 ProtocolHandlerMap* protocol_handlers) { |
207 return NULL; | 222 return NULL; |
208 } | 223 } |
209 | 224 |
210 ResourceContext* ShellBrowserContext::GetResourceContext() { | 225 ResourceContext* ShellBrowserContext::GetResourceContext() { |
211 return resource_context_.get(); | 226 return resource_context_.get(); |
212 } | 227 } |
213 | 228 |
214 GeolocationPermissionContext* | 229 GeolocationPermissionContext* |
215 ShellBrowserContext::GetGeolocationPermissionContext() { | 230 ShellBrowserContext::GetGeolocationPermissionContext() { |
216 return NULL; | 231 return NULL; |
217 } | 232 } |
218 | 233 |
219 quota::SpecialStoragePolicy* ShellBrowserContext::GetSpecialStoragePolicy() { | 234 quota::SpecialStoragePolicy* ShellBrowserContext::GetSpecialStoragePolicy() { |
220 return NULL; | 235 return NULL; |
221 } | 236 } |
222 | 237 |
223 } // namespace content | 238 } // namespace content |
OLD | NEW |